Modifiable Factor Relationships with Biopsychosocial Disability in Multiple Sclerosis
Brant J. Oliver
Problem Statement: Multiple sclerosis (MS) is a chronic disease of the central nervous system and is among the most common neurological...

A variety of forensic methods have been developed to identify falsified photos, each unified by the ability to estimate and detect properties of a photo that are perturbed by forgery. There exist, however, many photos in which the required...

We present new forensic tools that are capable of detecting traces of tampering in digital images without the use of watermarks or specialized hardware. These tools operate under the assumption that images contain natural properties from a variety...

Access control is a core component of any information-security strategy. Researchers have spent tremendous energy over the past forty years defining abstract access-control models and proving various properties about them. However, surprisingly...

Nutrients play fundamental roles in biological systems, affecting plant growth and quality, community structure, and species interactions. Although the effects of nutrients on primary and secondary production have been well documented, their...

In the last few years, a new perspective on the management of obesity has emerged. Instead of focusing on dieting and weight loss efforts, the new approach focuses on size acceptance. The concept of positively accepting one's deviant features has...

Identifying the determinants of reproductive success in small-scale societies is critical for understanding how natural selection has shaped human evolution and behavior. The available evidence suggests that status-accruing behaviors such as...

The present work examines the cognitive structure of the self-concept. Improving upon established measures of self-complexity (H -statistic), cognitive complexity of the self-concept is measured in terms of the number of self-aspects and the...

From the most minimal of person information, such as a photograph or a sentence, people are able to rapidly infer a multitude of complex personality traits. These social inferences are thought to rely upon cognitive representations of person...

The central topic of the self has proven a vexing conundrum for philosophers and psychologists alike for centuries. Prior research suggests that the self is a powerful cognitive structure which biases attentional mechanisms in favor of apprehension...

Computer security has come a long way since the days of the first Internet worm. With the spreading and commercialization of the Internet, the stakes have gotten higher. Viruses existed and spread before most computers were online, but as global...

Scientific methods that detect deception have been studied since 1895. Among them, computational methods have gained popularity in recent decades thanks to the development of artificial intelligence, (AI). Detecting deception by categorizing...

This thesis approaches the problem of locating zero-day exploits used in network attacks. The hypothesis is that the advent of high-performance virtualization presents a unique opportunity to both discover these events and increase the attacker's...